![](https://assets.isu.pub/document-structure/240702191413-e4ed713bd74d949b9a79f6c2ca73c078/v1/f2803304d42e5a394c14173f9e302065.jpeg)
![](https://assets.isu.pub/document-structure/240702191413-e4ed713bd74d949b9a79f6c2ca73c078/v1/f2803304d42e5a394c14173f9e302065.jpeg)
INFRASTRUCTURE SURVEY TOOL
![](https://assets.isu.pub/document-structure/240702191413-e4ed713bd74d949b9a79f6c2ca73c078/v1/0b30b17d4b1acc99a15069bf895b68e8.jpeg)
The Infrastructure Survey Tool (IST) is a voluntary, web-based assessment that Protective Security Advisors conduct in coordination with facilities owners and operators to identify and document the overall security and resilience of the facility.
PROGRAM DESCRIPTION
The Cybersecurity and Infrastructure Security Agency (CISA) conducts an IST on facilities that request the service. The IST is focused on:
• Identifying facilities’ physical security, security forces, security management, information sharing, protective measures, and dependencies related to preparedness, mitigation, response, resilience, and recovery
• Identifying security areas of possible improvements
• Creating facility protective and resilience measures indices that show a comparison to similar facilities that have completed ISTs
• Tracking progress toward improving critical infrastructure security
CISA provides the IST assessment information to owners and operators in both a written report and the IST Dashboard, which is accessed through a secure web portal. The IST Dashboard graphically displays the collected data, which comprises weighted scores on a variety of factors for specific critical infrastructure. The dashboard compares the data against similar facilities and informs protective measures, resilience planning, and resource allocation. The dashboard provides a sector security and resilience overview, highlights areas of potential concern, and options to view the impact of potential enhancements to protection and resilience measures.
OUTCOMES
![](https://assets.isu.pub/document-structure/240702191413-e4ed713bd74d949b9a79f6c2ca73c078/v1/84e0c2840ade5bacbe8f9b029c247307.jpeg)
The written report developed from the IST data contains a description of the facility and its possible vulnerabilities as well as options to mitigate identified vulnerabilities. The information is eligible for protection from disclosure under the Protected Critical Infrastructure Information Program, and the Department of Homeland Security uses this information for steady-state analysis, special-event planning, and incident management.
For more information or to seek additional help, contact us at ISDAssessments@cisa.dhs.gov
![](https://assets.isu.pub/document-structure/240702191413-e4ed713bd74d949b9a79f6c2ca73c078/v1/8dbe3b48d519b95afa34c9bfe1f40fce.jpeg)
![](https://assets.isu.pub/document-structure/240702191413-e4ed713bd74d949b9a79f6c2ca73c078/v1/3c0b96b9621d7b9ffcdd3106c433bd30.jpeg)
![](https://assets.isu.pub/document-structure/240702191413-e4ed713bd74d949b9a79f6c2ca73c078/v1/eff29e2bf1bef5f5ad7e58b2b80a1df8.jpeg)
![](https://assets.isu.pub/document-structure/240702191413-e4ed713bd74d949b9a79f6c2ca73c078/v1/e5578305eed89060658d63eb66fe62f0.jpeg)
![](https://assets.isu.pub/document-structure/240702191413-e4ed713bd74d949b9a79f6c2ca73c078/v1/c2bf1f8f65a417bb14dde7770441809e.jpeg)
![](https://assets.isu.pub/document-structure/240702191413-e4ed713bd74d949b9a79f6c2ca73c078/v1/112de258d641bac365f7c14445301d56.jpeg)
![](https://assets.isu.pub/document-structure/240702191413-e4ed713bd74d949b9a79f6c2ca73c078/v1/0c18cecdd99ea4ed28ef64786ede96fb.jpeg)
![](https://assets.isu.pub/document-structure/240702191413-e4ed713bd74d949b9a79f6c2ca73c078/v1/e85ff7353d4712c2bf08828afe5b55e0.jpeg)